Security White Papers

This document presents a record of the Intrusion Attack and Response Workshop – Saving Private Data. It contains a checklist for managers whose responsibilities include their company's Incident Response Plan (IRP). The complete script is included, annotated with the main issues raised and the lessons to be learned.

This White Paper explores key concepts of identity management (trust, authentication, provisioning, authorization, and directories), places these concepts within their business, personal, and technical perspectives, and proposes a set of steps to be taken by The Open Group to serve as a change agent promoting the resolution of industry-wide impediments to interoperable identity management solutions.

This White Paper examines the issues involved in managing digital trust, and the controls that support interoperable trust management solutions in cyberspace, based on accepted business practices, and scalable to all sizes of enterprise.

This White Paper reviews the business drivers for de-perimeterization, to explain why de-perimeterization is happening all round us now, and is inevitable. To maintain their competitiveness for secure online working with business partners, customers, suppliers, and outworkers, IT-dependent organizations need to migrate to security solutions which are effective in our de-perimeterizing world. The Jericho Form® is leading the way forward on how to architect de-perimeterized security solutions.
Uk Isbn

This White Paper evaluates the different types of cloud and presents them in a Cloud Cube Model, highlighting the key characteristics in each type. It includes key questions that prospective cloud users need to ask their cloud service providers to provide adequate assurance that they are securely collaboratively enabled and compliant with applicable regulations.